Friday, 2024-04-19, 3:23 PM
Welcome Guest | RSS
Site menu
Login form
Buy Wifi Hacking Adapter
 

Best Laptop for Hacking
 










Main » 2011 » July » 28
A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known. There are zero days between the time the vulnerability is discovered and the first attack.

Ordinarily, when someone detects that a software program contains a potential security issue, that person or company will notify the software company (and sometimes the world at large) so that action can be taken. Given time, the software company can fix the code and distribute a patch or software update. Even if potential attackers hear about the vulnerability, it may take them some time to exploit it; meanwhile, the fix will hopefully become available first.

Sometimes, however, a hacker may be the first to discover the vulnerability. ... Read more »

Views: 849 | Added by: defaultNick | Date: 2011-07-28 | Comments (0)

The NeXpose Community Edition is a free, single-user vulnerability management solution specifically designed for very small organization or individual use. NeXpose Community Edition is powered by the same scan engine as award-winning NeXpose Enterprise and offers many of the same features. Support is available via the extensive online Community. Rapid7 offers a free version of NeXpose Community Edition for you to download and use.

Minimum System Requirements

  • 2 GHz processor or higher
  • 4 GB (32bit), 8 GB RAM (64bit)
  • 10 GB + available disk space
  • ... Read more »
Views: 838 | Added by: defaultNick | Date: 2011-07-28 | Comments (0)